
[CIVN-2026-0061] Multiple Vulnerabilities in VMware products
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in VMware products
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: CRITICAL
Software Affected
VMware vCenter Server version prior to 8.0 U2d, 8.0 U1e and 7.0 U3r
VMware Cloud Foundation versions 4.x & 5.x
Overview
Multiple vulnerabilities have been reported in VMware products which could allow an attacker to execute arbitrary code and escalate privileges on the targeted system.
Target Audience:
Enterprises and large organizations, Cloud providers, and industries with IT environments utilizing VMware products.
Risk Assessment:
High risk of unauthorized access, data exposure and client-side code execution.
Impact Assessment:
Remote code execution, Privilege escalation.
Description
VMware provides virtualization software solutions that enable organizations to create and manage virtual machines (VMs), allowing multiple operating systems to run on a single physical machine.
Multiple vulnerabilities have been reported in VMware products due to heap-overflow in the implementation of the DCERPC protocol and misconfiguration of sudo. An attacker could exploit these vulnerabilities by sending specially crafted network requests on the targeted system.
Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code and escalate privileges on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453
Vendor Information
VMware
https://www.vmware.com/
References
VMware
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453
CVE Name
CVE-2024-37079
CVE-2024-37080
CVE-2024-37081
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=Gh/P
—–END PGP SIGNATURE—–


